Top 10 spyware tricks of 2005



You can tell we’re in the last 10-12 days of the year when we start seeing all sorts of year end retrospectives, year’s in review, countdowns of the top ___ of ___year ending___. Well, spyware has seen a banner year in many respects and Suzi at Spyware Confidential has a rundown of the top 10 tricks used in 2005.


Here’s a brief highlight…

10. Spyware spread through Windows Media files
9. Adware companies hide their dirty work using rootkit technology
8. Internet Explorer infected through Firefox
7. Direct Revenue unleashed Aurora
6. Spam bots, keyloggers, kiddie porn connect with major adware companies
5. Spazbox domain installs massive spyware/adware – using IRC
4. Anti-spyware spread by spyware and trojans
3. Direct Revenue adware distributed through BitTorrent
2. AIM worm carries backdoor, rootkit and adware, found to be powered by world wide bot net with ties to the Middle East.
1. Sony BMG infects users with DRM rootkit

What’s distressing is that I’m sure we haven’t seen the last of these tricks… In fact given the traction that some of the rogues have made with #4 above… that may be a favored vector this coming year. I’m sure that we’ll also see other, new tactics.

Earlier this afternoon I did some work for someone that had just recently got a new DSL connection. (And Symantec Internet Security 2006). She had got tons of messenger popup spam. (LAN connection was firewalled, but the PPPoE wasn’t..(?)) Anyway, she was confused about why Symantec would be popping up asking her to download win-fix for $49… So even some of the old vectors are still common. Fortunately she didn’t bite… (and now everything is firewalled and several services are disabled.

Related Posts

Blog Traffic Exchange Related Posts
  • Botnets and spyare "It outta be illegal" is the first thing I usually hear as I start the long process of sanitizing a spyware infested windows machine. The fact is some parts of it ARE, some are just ethically questionable. The area that's against the law is the part that involves tacking control......
  • The latest and greatest in Malware Removals I have started referring to malware more and more lately because the term virus doesn't exactly describe the pests I see on peoples machines and the terms spyware or adware aren't doing justice to some of these pests either. (There are many pieces of what I would consider malware that......
  • The Vista stories keep coming - Vista bad news for small security companies VuNet has an article today on the coming of Vista and the imminent doom of the smaller security companies. The hardest hit will be anti-spyware and personal firewall vendors they say. It may well be true, it does sound like a different approach to user permissions (limited priviliges by default?)......
Blog Traffic Exchange Related Websites
  • Resolutions Suck…Start a New Year’s Evolution! Resolutions Don't Work!  Try a New Year’s Evolution! I wrote a post last year about why New Year’s resolutions never work, but added three reasons to feel better about that. I suggested that a New Year’s “evolution” would be much more valuable, so this year I wanted to elaborate on......
  • The Backswing The swing itself, to a very large degree, is actually a chain reaction if you think about it. When you make one good move, then that is generally going to lead to another good move. If on the other hand you end up making a mistake, then another mistake is......
  • Spyware Adware Removal At Free Of Cost Adware and spyware have always been a major problem of using the internet and. Because of their hostile behavior, they have turned into malware. Some people intentionally use it for identity theft purpose. Some steps can help you stay away from its hazardous behavior. Use Latest Browser Using latest and......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site